skip to main content
10.1145/2047456.2047459acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
research-article

PKI and access control in office environments

Published:30 September 2011Publication History

ABSTRACT

One of the most common problems associated with network security is access control. Access control is the key to all aspects of security, and it is a point that should be well considered by any security team. A common misconception about access control is that is begins and ends with locked doors, and this is sadly mistaken. Access control limits access to specific area of buildings, which house network servers, offices, terminals, and a host of other devices and data that must be protected. PKI would be useful to the Security Professional, as it creates a Web of Trust between all users on the network, and when that trust is violated, only then does the security team have to jump into action. This technique is being used within the medical field and in many research and development departments across the United States, but is not currently in place in the typical office environment. This method would enhance the overall security of a given office network, provide the security teams with an easier network to maintain, and speed up the flow of data within the office environment.

References

  1. Kiran, S., Lareau, P., and Lyod S. 2002. PKI Basics: A Technical Perspective. PKI Note. http://www.pkiforum.org.Google ScholarGoogle Scholar
  2. Introduction to Public Key Infrastructure (PKI). http://www.articsoft.comGoogle ScholarGoogle Scholar
  3. Raina, K. (2003). PKI security solutions for the enterprise: Solving HIPAA, E-Paper Act, and other compliance issues. Danvers, MA 01923: Wiley Publishing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Røstad, L. (2008). Access Control in Healthcare Information Systems: Thesis for the degree of Philosophiae Doctor (PhD). Trondheim, Norway: Norwegian University of Science and Technology.Google ScholarGoogle Scholar
  5. Whitten A. and J. D. Tygar, Why Johnny Can't Encrypt A Usability Evaluation of PGP 5.0, Proceedings of the 8th USENIX Security Symposium (Washington, D. C., Aug. 23--36, 1999), 169--184. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. PKI and access control in office environments

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Other conferences
                  InfoSecCD '11: Proceedings of the 2011 Information Security Curriculum Development Conference
                  September 2011
                  111 pages
                  ISBN:9781450308120
                  DOI:10.1145/2047456

                  Copyright © 2011 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 30 September 2011

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • research-article

                  Acceptance Rates

                  Overall Acceptance Rate18of23submissions,78%

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader